Best Responses to ‘How and When Do You Trust a Security Vendor?’ – CISO/Security Vendor Relationship Series

Again and again I hear from CISOs and security buyers that they want to trust security vendors first. But at the same time they say they don’t trust easily. How does a security buyer form that trust? What are the elements that make up that decision? Are they willing to trust quickly? Do they rely on their trusted connections? What is it? I asked many question and many responded with what makes up that trust and their recommendations for vendors on how to create it.

Here’s the original article.

And the discussion on LinkedIn.

Featured eBook
Container Security: Securing from Within

Container Security: Securing from Within

Containers increase speed, simplify operations, improve development efficiency and bring a slew of other benefits, making them a top choice for agile deployment infrastructure. Everything from web apps, services, data stores, command line apps, desktop apps and other Linux programs can easily be packaged within containers. However, issues regarding their security have grown. Unsecured containers ... Read More
Security Boulevard

David Spark

David Spark is a veteran tech journalist with nine years experience covering cybersecurity. He has partnered with Security Boulevard to continue his popular CISO/Security Vendor Relationship Series. Spark is also the founder of the Spark Media Solutions, a B2B content marketing agency for the tech industry. He's a former standup comic, comedy writer for The Second City in Chicago, and San Francisco tour guide.

david-spark has 28 posts and counting.See all posts by david-spark